Sign Up to follow journals, search in your chosen journals and, optionally, receive Email Alerts when new issues of your Followed Journals are published.Already have an account? Sign In to see the journals you follow.

Authors:Md Ahsan ArifAbstract: Delay of Voice End (DOVE) user is a promising technique in enhancement of carried traffic of both voice and data of a network. Several literatures are available for DOVE in voice data integrated services. In this paper, the same concept is applied in micro-macro cellular system, where DOVE is applied at the end of user of micro cell and macro cell separately in comparison of different traffic parameters. The impact of DOVE on call blocking probability in micro cell and macro cell is analyzed against offered traffic of both micro and macro cell varying the delay parameter.PubDate: 2014-01-08Issue No:Vol. 2 (2014)

Authors:Prianka Sikder, Shuvashis DeyAbstract: The WLAN is operated in some high traffic area where the radiation beam produced by the antenna is to be utilized with optimum efficiency. The aim of those antennas is to produce some directive and switched beams rather than producing Omni-directional pattern since these beam patterns are considered to be wastage in some non-used or low traffic areas. Hence, the antenna systems producing the directive and switched beams should be highly preferred for the WLAN application. A smart antenna array system performs the adaptive beam forming by focusing the beam in the desired direction and creating nulls in other directions to avoid the interference and the wasting of the beams. This is performed by the operating the phase shifting in its feed network and different ports. This paper investigates the performance of the square or planar array pattern with different phase shifting for the optimum performance of the WLAN applications in a highly congested indoor environment.PubDate: 2014-01-08Issue No:Vol. 2 (2014)

Authors:Md Ahsan ArifAbstract: The development of software is the most important part of a computer system. Presently, digital system gives a tremendous leadership in the corporate sector. To meet this demand, users face lack of speed and reliability in the modern digital system. Improvement of the performance of computer and software has been a topic of a great interest for the last era. The researches on both the hardware and software technology and compiler optimization have been applied in an effort to make the execution of software applications faster than before. Many developers have been influencing to adopt different programming languages replacing the old ones in accordance with their own choices. Those researches focus on the ways for assessing the effectiveness of the integrated programming language in the performance of computer system and utilization of resources. The researches also met two experimentation aims, which are extensive study of relevant writing and the implementation of applied enquiry. This was carried out through a case study with a software application that is developed by the integrated programming language. The major key findings of this analysis are: 1. Quality Algorithm 2. Selection of Suitable Programming Languages 3. Expert Writing Code and Tuned SQL query. Our findings show that the programming language has a huge effect on CPU or software performance in both the web and desktop. These observations can hold the interest of the developers and software architectural designers, who have been designing the system for executing the programs.PubDate: 2014-01-08Issue No:Vol. 2 (2014)

Authors:Masudul Haque BhuiyanAbstract: One can retrieve credential information –credit card number, email password etc and other important information by using cross site scripting. Session hijacking, Web page deface, Redirect to attacker’s personal tracking web site are the common output for the cause of cross site scripting attack. In this paper we deeply analysis implementation technique of preventing cross site scripting attack of three latest tools or proposals such as Blueprint, XSSDS, SWAP. Here we evaluated Blueprint against XSSDS and SWAP directly and we also compare Blueprint against an optimal solution which is made by the combination of Blueprint and SWAP.PubDate: 2014-01-08Issue No:Vol. 2 (2014)